You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The function that processes TCP options does not validate their lengths, allowing attackers to put the function into an infinite loop with uncommon/unsupported TCP options that have crafted length values.
Root cause
An issue was discovered in picoTCP and picoTCP-NG through 1.7.0. When an unsupported TCP option with zero length is provided in an incoming TCP packet, it is possible to cause a Denial-of-Service by achieving an infinite loop in the code that parses TCP options, aka tcp_parse_options() in pico_tcp.c.
Description
Root cause
Software
Name
picoTCP, picoTCP-NG
Versions affected
≤ 1.7.0
Links
The text was updated successfully, but these errors were encountered: